MIS Exam 2
_________ provide data, voice, and video connectivity to customers
Telecommunication services
All of the following are eras in IT infrastructure evolution except ______
The disruptive technology era
_______ converts domain names to IP addresses
The domain name system (DNS)
Networks of interconnected wireless devices that are embedded in the physical enviroment to provide measurements of many points over large spaces are called _____
Wireless sensor networks
Independent computer programs that copy themselves from one computer to others over a network are called _____
Worms
Hackers flooding a network server with many thousands of false communication requests is called ______
a denial-of-service attack
A model of computing that provides a shared pool of computing resources for an organization to use over the internet is called _____
Cloud computing
The career field that deals with collection and examination fo computer data for legal evidence is called ____
Computer Forensic
A firms ______ could include an awareness of computer forensic
Contingency planning process
the process of detecting and correcting errors in a database is called _____
Data cleansing
A(n) ______ is a structured survey of the accuracy and level of completeness of data in an information system
Data quality audit
A(n) ______ is a database that stores historic and current data for the use of decisions makers in the organization
Data warehouse
The corporate function that is responsible for defining and organization the content of the database as well as database maintenance is _____
Database administration
A(n) _____ enables an organization to centrally manage and organize data
Database management system
A(n) _____ is a discrete binary waveform used for transmission of data
Digital Signal
_______ operates over existing telephone lines to carry data, voice, and video
Digital subscriber line (DSL) technologies
A person, place, or thing which is stored in a database is called a(n)____
Entity
A grouping of characteristic into a word of group of words is called a(n)_____
Field
A combination of hardware and software that prevents unauthorized users from accessing a network is called a _______
Firewall
_____ is a lightweight operating system for cloud computing
Google Chrome OS
The law that requires financial institutions to sneer confidentially of customer data is called the _____
Gramm-Leach-Bililey Act
An open source framework for parallel processing across inexpensive computers is called _____
Hadopp
All of the following are important questions about IT governance EXCEPT ____
How data should be stored in a database
A new version of IP addressing, which contains a 128-bit addresses, is called _____
IPv6
______ consists of processes and tools to identify the valid users of a system
Identity management
______ are used to reliability and securely handle huge transaction volumes, analyze huge data sets, and support large workloads in cloud data centers
Mainframe Computers
A network that spans a city is called a(n)____
Metropolitan area network
______ states that the number of components that a computer chip can hold doubles every two years
Moore's Law
_____ use a more flexible data model and are designed for big data
Non-relational database management systems
Free software produces by a team of hundreds of thousands of programmers around the world is called ____
Open source software
The method of slicing digital messages into pieces, sending the pieces over different communication media and then reassembling the pieces is called _____
Packet Switching
A communication processor used to direct packets of data through different networks is called a(n)____
Router
The network operating system (NOS) _____
Routes network Traffic
A type of malware that takes advantage of poorly coded Web applications is called ____
SQL injection attacks
The ability of a computer, product, or system to expand to serve more users without breaking down is called
Scalability
In relational database, the ____ operation creates a subset of records in the file that meet stated criteria
Select
All of the following are total cost of ownership infrastructure components EXCEPT ____
Staff Salaries
All of the following are part of the transmission control protocol.internet protocol refers model EXCEPT ____
Switching Layer
All of the following are methods of authentication EXCEPT _______
TCP/IP
All of the following are wearable computing devices EXCEPT _____
Tablet Computers
Data which are not visible of the average user are called _____
Ambient data
A risk _______ determines the level of risk to an organization if an activity or process is not properly controlled
Assessment
The range of frequencies that can be accommodated on a telecommunication channel is called ___
Bandwidth
____ is the popular name for a networking standard useful for creating small personal-area networks
Bluetooth
The widespread use of personal devices in the workplace and school is often referred to as ____
Bring your own device (BYOD)`
______ is another way to facility big data analysis and remove bottlenecks normally found in a traditional database
In-memory computing
Data is considered to be _____ when the same attribute has different values
Inconsistent
A(n) ______ specifies the rules of an organization for sharing an disseminating information
Information Policy
A(n) ________ examines the firms overall security includes controls governing individual systems
Information systems audit
All of the following are general controls EXCEPT _____
Input controles
_______ support(s) a firm's website and include(s) web hosting services, router, and cabling or wireless equipment
Internet Platforms
_______ feature (s) monitor the network at its most vulnerable points
Intrusion detection systems
_____ is an object-oriented programming language that is processor and operating system independent
Java
_______ systems are older transaction processing systems, usually created for mainframes
Legacy
The leading operating system on services, mainframe computers, and supercomputers is
Linux
All of the following are physical transmission media EXCEPT ____
Powerlines
The unique identifier for all data in a table is called the _____
Primary Key
Coupling of files used to store information and the application program is called ____
Program-data dependence
A form of encryption that uses two keys is called ______
Public Key encryption
A type of computer that could be in many states at once is called a ____
Quantum Computer
_____ is very useful for inventory and supply chain management
RFID
When thinking about security, controles _____
Refer to policies and procedures that ensure the safety of an organization assets
The decision to purchase or rent IT assets is called the ____
Rent-Versus-Buy Decision
All of the following are essential characteristics of the cloud EXCEPT _____
Web Beacons
A set of loosely coupled software components that exchange information with one another using universal standard languages is called ______
Web Services
All of the following are major internet services EXCEPT ____
Web beacons
All of the following are types of information obtained from data mining EXCEPT ______
Web beacons
A new family of standards developed to deal with the fact that people in remote areas do not have access to Wifi is called ____
WiMax